2017
DOI: 10.3390/s17040781
|View full text |Cite
|
Sign up to set email alerts
|

The Physical Layer Security Experiments of Cooperative Communication System with Different Relay Behaviors

Abstract: Physical layer security is an attractive security mechanism, which exploits the randomness characteristics of wireless transmission channel to achieve security. However, it is hampered by the limitation of the channel condition that the main channel must be better than the eavesdropper channel. To alleviate the limitation, cooperative communication is introduced. Few studies have investigated the physical layer security of the relay transmission model. In this paper, we performed some experiments to evaluate t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
5
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 25 publications
0
5
0
Order By: Relevance
“…There is currently no effective treatment for SCI. The pathological mechanism of SCI is complex, involving multiple factors such as oxidative stress [ 3 ], inflammation [ 4 ], and apoptosis [ 5 ]. Primary traumatic SCI can induce the release of reactive oxygen species (ROS) and inflammatory factors, triggering the activation of microglia.…”
Section: Introductionmentioning
confidence: 99%
“…There is currently no effective treatment for SCI. The pathological mechanism of SCI is complex, involving multiple factors such as oxidative stress [ 3 ], inflammation [ 4 ], and apoptosis [ 5 ]. Primary traumatic SCI can induce the release of reactive oxygen species (ROS) and inflammatory factors, triggering the activation of microglia.…”
Section: Introductionmentioning
confidence: 99%
“…The self-interference from the relaying antenna to the eavesdropping antenna at the legitimate monitor is assumed to be perfectly cancelled by using advanced analog and digital self-interference cancellation methods [13]. DF can be assumed here as in [8,27]. In addition, E can act as a fake relay and thus obtain the channel state information and the symbol format of the suspicious link, and synchronize with S and D [19,20].…”
Section: System Model and Assumptionsmentioning
confidence: 99%
“…Conventional wireless security studies generally assume wireless communication is rightful, i.e., the eavesdropper is treated as an adversary, and aim to preserve their confidentiality and prevent malicious eavesdropping [7,8]. In the presence of a malicious eavesdropper, the network of point-to-point [7], relaying [8,9], multi-user [10,11], and cognitive radio [12] were investigated. In contrast, legitimate eavesdropping or wireless information surveillance is a paradigm shift of wireless security, where the monitor is regarded as a legitimate eavesdropper.…”
Section: Introductionmentioning
confidence: 99%
“…However, it is limited insofar as the main channel must be better than the eavesdropper channel. Cooperative communication was shown to ease this difficulty [7]. An actual-size concave grating with structural randomness was numerically analyzed.…”
Section: Introductionmentioning
confidence: 99%